Pipe networks for aspirating smoke detectors are often designed digitally. A practice not taken into account in the EU-wide binding standard EN 54-20: There are no specific requirements for dealing with the relatively new design programmes.

So manufacturers had to spend extra time and money on having their software separately legitimised during the well-known innovation-supporting VdS-Approvals. 

Precise and compact guidelines

For facilitating and reassuring their development work, our partners understandably wanted clear standards in black on white,” explains Rafael Bernsdorf, head of the VdS laboratories for special fire detection technology products.

This is exactly what we now provide with our precise and compact Guidelines. They can be downloaded for free and are, of course, fully compliant with existing standards while supporting the potential of modern safety systems."

VdS 6036

The new publication VdS 6036, “Aspirating Smoke Detectors with a Design Software for Sampling Devices”, is available on the website.

Accurate guidance on threshold values, transport time, pipe topology, and sensitivity of the sampling points ensure that digitally designed pipe networks function reliably. 

In case you missed it

What are emerging applications for physical security in transportation?
What are emerging applications for physical security in transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher & Fortified enhance perimeter security solutions
Gallagher & Fortified enhance perimeter security solutions

Global security manufacturer - Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years...

Genetec: Data sovereignty in physical security
Genetec: Data sovereignty in physical security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...